shaddy43 / AES_Shellcode_EncryptorLinks
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
β16Updated 4 years ago
Alternatives and similar repositories for AES_Shellcode_Encryptor
Users that are interested in AES_Shellcode_Encryptor are comparing it to the libraries listed below
Sorting:
- A small Aggressor script to help Red Teams identify foreign processes on a host machineβ84Updated 3 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 3 years ago
- Another AMSI bypass - but in C++.β24Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.β33Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.β10Updated 3 years ago
- A python port of CCob's ThreadlessInjectβ25Updated 2 years ago
- A .NET binary loader that bypasses AMSIβ45Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for locβ¦β55Updated 2 years ago
- One gate to all syscalls!β23Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ15Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementationβ24Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciouslyβ32Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β41Updated 4 years ago
- Poc of using youtube comments for C2 communicationsβ10Updated 4 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)β30Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 4 years ago
- AMSI Bypass for powershellβ30Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniquesβ27Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.β90Updated 4 years ago
- Yet, Another Packer/Loaderβ25Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.β42Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellcβ¦β15Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β18Updated 6 years ago
- Extracting Syscall Stub, Modernizedβ66Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL packageβ35Updated 2 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.β55Updated 3 years ago
- Small POC for process ghostingβ40Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.β40Updated 3 years ago